-
1
-
-
37249053884
-
Social network sites: definition, history, and scholarship
-
D.M.Boyd, N.B.Ellison. Social network sites: definition, history, and scholarship. J Comput-Mediat Comm. 2007;13(1):210–230.10.1111/j.1083-6101.2007.00393.x
-
(2007)
J Comput-Mediat Comm
, vol.13
, Issue.1
, pp. 210-230
-
-
Boyd, D.M.1
Ellison, N.B.2
-
3
-
-
84912044881
-
Forensic investigation of social networking applications
-
M.Taylor, J.Haggerty, D.Gresty, P.Almond, T.Berry. Forensic investigation of social networking applications. Network Secur. 2014;2014(11):9–16.10.1016/S1353-4858(14)70112-6
-
(2014)
Network Secur
, vol.2014
, Issue.11
, pp. 9-16
-
-
Taylor, M.1
Haggerty, J.2
Gresty, D.3
Almond, P.4
Berry, T.5
-
4
-
-
84881484461
-
Extent of private information disclosure on online social networks: an exploration of Facebook mobile phone users
-
V.Kisekka, S.Bagchi-Sen, H.Raghav Rao. Extent of private information disclosure on online social networks: an exploration of Facebook mobile phone users. Comput Human Behav. 2013;29(6):2722–2729.10.1016/j.chb.2013.07.023
-
(2013)
Comput Human Behav
, vol.29
, Issue.6
, pp. 2722-2729
-
-
Kisekka, V.1
Bagchi-Sen, S.2
Raghav Rao, H.3
-
5
-
-
84907212016
-
-
Pew Research Center’s Internet & American Life Project [Internet], [cited 20 November 2014]. Available from
-
J.Brenner. Social networking fact sheet. Pew Research Center’s Internet & American Life Project [Internet]. 2013 [cited 20 November 2014]. Available from: http://www.pewinternet.org/fact-sheets/social-networking-fact-sheet/
-
(2013)
Social networking fact sheet
-
-
Brenner, J.1
-
7
-
-
79960864204
-
iSAM: an iPhone stealth airborne malware
-
Camenisch J., Fischer-Hübner S., Murayama Y., Portmann A., Rieder C., (eds), Springer, Berlin Heidelberg:
-
D.Damopoulos, G.Kambourakis, S.Gritzalis. iSAM: an iPhone stealth airborne malware. In: J.Camenisch, S.Fischer-Hübner, Y.Murayama, A.Portmann, C.Rieder, editors. Future challenges in security and privacy for academia and industry. IFIP Advances in Information and Communication Technology. Springer: Berlin Heidelberg; 2011. p. 17–28.
-
(2011)
Future challenges in security and privacy for academia and industry. IFIP Advances in Information and Communication Technology
, pp. 17-28
-
-
Damopoulos, D.1
Kambourakis, G.2
Gritzalis, S.3
-
8
-
-
84876542471
-
From keyloggers to touchloggers: take the rough with the smooth
-
D.Damopoulos, G.Kambourakis, S.Gritzalis. From keyloggers to touchloggers: take the rough with the smooth. Comput Secur. 2013;32:102–114.10.1016/j.cose.2012.10.002
-
(2013)
Comput Secur
, vol.32
, pp. 102-114
-
-
Damopoulos, D.1
Kambourakis, G.2
Gritzalis, S.3
-
10
-
-
84889085369
-
A critical review of 7 years of mobile device forensics
-
K.Barmpatsalou, D.Damopoulos, G.Kambourakis, V.Katos. A critical review of 7 years of mobile device forensics. Digital Invest. 2013;10(4):323–349.10.1016/j.diin.2013.10.003
-
(2013)
Digital Invest
, vol.10
, Issue.4
, pp. 323-349
-
-
Barmpatsalou, K.1
Damopoulos, D.2
Kambourakis, G.3
Katos, V.4
-
13
-
-
84963541600
-
Chapter 14-Conceptual evidence collection and analysis methodology for Android devices
-
Choo K.-K.R., (ed), Boston, MA: Syngress
-
B.Martini, Q.Do, K.-K.R.Choo. Chapter 14-Conceptual evidence collection and analysis methodology for Android devices. In: K.-K.R.Choo, editor. The Cloud Security Ecosystem. Boston, MA: Syngress; 2015. p. 285–307.
-
(2015)
The Cloud Security Ecosystem
, pp. 285-307
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
14
-
-
84964322400
-
Chapter 19-Ubuntu One investigation: detecting evidences on client machines
-
Choo K.-K.R., (ed), Boston, MA: Syngress
-
M.Shariati, A.Dehghantanha, B.Martini, K.-K.R.Choo. Chapter 19-Ubuntu One investigation: detecting evidences on client machines. In: K.-K.R.Choo, editor. The Cloud Security Ecosystem. Boston, MA: Syngress; 2015. p. 429–446.
-
(2015)
The Cloud Security Ecosystem
, pp. 429-446
-
-
Shariati, M.1
Dehghantanha, A.2
Martini, B.3
Choo, K.-K.R.4
-
15
-
-
84862641293
-
Commercial use of Facebook and Twitter – risks and rewards
-
C.Hutchings. Commercial use of Facebook and Twitter – risks and rewards. Comput Fraud Secur. 2012;2012(6):19–20.10.1016/S1361-3723(12)70065-9
-
(2012)
Comput Fraud Secur
, vol.2012
, Issue.6
, pp. 19-20
-
-
Hutchings, C.1
-
16
-
-
84886414710
-
A framework for the E-Discovery of social media content in the United States
-
J.C.Sipior, B.T.Ward, L.Volonino, L.MacGabhann. A framework for the E-Discovery of social media content in the United States. Inf Sys Manag. 2013;30(4):352–358.10.1080/10580530.2013.832965
-
(2013)
Inf Sys Manag
, vol.30
, Issue.4
, pp. 352-358
-
-
Sipior, J.C.1
Ward, B.T.2
Volonino, L.3
MacGabhann, L.4
-
17
-
-
84976572271
-
Towards “crime specific” digital investigation frameworks
-
University of Cardiff, Cardiff:
-
O.Angelopoulou, S.Vidaliss. Towards “crime specific” digital investigation frameworks. In: School of Computer Science, University of Cardiff, Cardiff; 2013.
-
(2013)
School of Computer Science
-
-
Angelopoulou, O.1
Vidaliss, S.2
-
19
-
-
80051672577
-
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
-
G.Grispos, T.Storer, W.B.Glisson. A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Invest. 2011;8(1):23–36.10.1016/j.diin.2011.05.016
-
(2011)
Digital Invest
, vol.8
, Issue.1
, pp. 23-36
-
-
Grispos, G.1
Storer, T.2
Glisson, W.B.3
-
23
-
-
84881296322
-
A study of user data integrity during acquisition of Android devices
-
N.Son, Y.Lee, D.Kim, J.I.James, S.Lee, K.Lee. A study of user data integrity during acquisition of Android devices. Digital Invest. 2013;10(Supplement):S3–S11.10.1016/j.diin.2013.06.001
-
(2013)
Digital Invest
, vol.10
, pp. S3-S11
-
-
Son, N.1
Lee, Y.2
Kim, D.3
James, J.I.4
Lee, S.5
Lee, K.6
-
24
-
-
79961091178
-
Toward a general collection methodology for Android devices
-
T.Vidas, C.Zhang, N.Christin. Toward a general collection methodology for Android devices. Digital Invest. 2011;8(Supplement):S14–S24.10.1016/j.diin.2011.05.003
-
(2011)
Digital Invest
, vol.8
, pp. S14-S24
-
-
Vidas, T.1
Zhang, C.2
Christin, N.3
-
26
-
-
84857917909
-
Acquisition and analysis of volatile memory from android devices
-
J.Sylve, A.Case, L.Marziale, G.G.Richard. Acquisition and analysis of volatile memory from android devices. Digital Invest. 2012;8(3–4):175–184.10.1016/j.diin.2011.10.003
-
(2012)
Digital Invest
, vol.8
, Issue.3-4
, pp. 175-184
-
-
Sylve, J.1
Case, A.2
Marziale, L.3
Richard, G.G.4
-
27
-
-
84912008171
-
Exfiltrating data from Android devices
-
Q.Do, B.Martini, K.-K.R.Choo. Exfiltrating data from Android devices. Comput Secur. 2015;48:74–91.10.1016/j.cose.2014.10.016
-
(2015)
Comput Secur
, vol.48
, pp. 74-91
-
-
Do, Q.1
Martini, B.2
Choo, K.-K.R.3
-
30
-
-
84863615849
-
-
2010 ed, Berkeley, Calif. : New York: Apress
-
S.Morrissey, T.Campbell. iOS forensic analysis: for iPhone, iPad, and iPod touch. 2010 ed. Berkeley, Calif.: New York: Apress; 2010.10.1007/978-1-4302-3343-5
-
(2010)
iOS forensic analysis: for iPhone, iPad, and iPod touch
-
-
Morrissey, S.1
Campbell, T.2
-
31
-
-
79961063454
-
iPhone 3GS forensics: Logical analysis using apple iTunes backup utility
-
M.Bader, I.Baggili. iPhone 3GS forensics: Logical analysis using apple iTunes backup utility. Small Scale Digital Device Forensics J. 2010;4(1):1–15.
-
(2010)
Small Scale Digital Device Forensics J
, vol.4
, Issue.1
, pp. 1-15
-
-
Bader, M.1
Baggili, I.2
-
33
-
-
84864628454
-
Forensic analysis of social networking applications on mobile devices
-
N.Al Mutawa I.Baggili, A.Marrington. Forensic analysis of social networking applications on mobile devices. Digital Invest. 2012;9:S24–S33.10.1016/j.diin.2012.05.007
-
(2012)
Digital Invest
, vol.9
, pp. S24-S33
-
-
Al Mutawa, N.1
Baggili, I.2
Marrington, A.3
-
35
-
-
84892395081
-
iOS forensics: how can we recover deleted image files with timestamp in a forensically sound manner?
-
A.Ariffin, C.D’Oorazio, K.-K.R.Choo, J.Slay. iOS forensics: how can we recover deleted image files with timestamp in a forensically sound manner? In: 2013 Eighth International Conference on Availability, Reliability and Security (ARES); 2013. p. 375–382.10.1109/ARES.2013.50
-
(2013)
2013 Eighth International Conference on Availability, Reliability and Security (ARES)
, pp. 375-382
-
-
Ariffin, A.1
D’Oorazio, C.2
Choo, K.-K.R.3
Slay, J.4
-
36
-
-
79960138845
-
Sensitive privacy data acquisition in the iPhone for digital forensic analysis
-
Park J.J., Lopez J., Yeo S.-S., Shon T., Taniar D., (eds), Berlin Heidelberg: Springer
-
J.Jung, C.Jeong, K.Byun, S.Lee. Sensitive privacy data acquisition in the iPhone for digital forensic analysis. In: J.J.Park, J.Lopez, S.-S.Yeo, T.Shon, D.Taniar, editors. Secure and Trust Computing, Data Management and Applications. Communications in Computer and Information Science. Berlin Heidelberg: Springer; 2011. p. 172–186.
-
(2011)
Secure and Trust Computing, Data Management and Applications. Communications in Computer and Information Science
, pp. 172-186
-
-
Jung, J.1
Jeong, C.2
Byun, K.3
Lee, S.4
-
37
-
-
84855837531
-
-
Current Trends in Information Technology (CTIT), 2011 International Conference and Workshop on. IEEE
-
H.Said, A.Yousif, H.Humaid. IPhone forensics techniques and crime investigation. in: Current Trends in Information Technology (CTIT), 2011 International Conference and Workshop on. IEEE; 2011. p. 120–125.
-
(2011)
IPhone forensics techniques and crime investigation
, pp. 120-125
-
-
Said, H.1
Yousif, A.2
Humaid, H.3
-
38
-
-
84860532325
-
iPhone social networking for evidence investigations using iTunes forensics
-
New York, NY: ACM
-
Y.-C.Tso, S.-J.Wang, C.-T.Huang, W.-J.Wang. iPhone social networking for evidence investigations using iTunes forensics. In: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication. ICUIMC '12. New York, NY: ACM; 2012. p. 62:1–62:7.
-
(2012)
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication. ICUIMC '12
, pp. 62:1-62:7
-
-
Tso, Y.-C.1
Wang, S.-J.2
Huang, C.-T.3
Wang, W.-J.4
-
39
-
-
84875147433
-
Digital droplets: Microsoft SkyDrive forensic data remnants
-
D.Quick, K.-K.R.Choo. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Gener Comput Syst. 2013;29(6):1378–1394.10.1016/j.future.2013.02.001
-
(2013)
Future Gener Comput Syst
, vol.29
, Issue.6
, pp. 1378-1394
-
-
Quick, D.1
Choo, K.-K.R.2
-
40
-
-
84877809583
-
Dropbox analysis: data remnants on user machines
-
D.Quick, K.-K.R.Choo. Dropbox analysis: data remnants on user machines. Digital Invest. 2013;10(1):3–18.10.1016/j.diin.2013.02.003
-
(2013)
Digital Invest
, vol.10
, Issue.1
, pp. 3-18
-
-
Quick, D.1
Choo, K.-K.R.2
-
41
-
-
84896319180
-
Google drive: forensic analysis of data remnants
-
D.Quick, K.-K.R.Choo. Google drive: forensic analysis of data remnants. J Network Comput App. 2014;40:179–193.10.1016/j.jnca.2013.09.016
-
(2014)
J Network Comput App
, vol.40
, pp. 179-193
-
-
Quick, D.1
Choo, K.-K.R.2
-
42
-
-
84908237752
-
Forensic analysis of WhatsApp Messenger on android smartphones
-
C.Anglano. Forensic analysis of WhatsApp Messenger on android smartphones. Digital Invest. 2014;11(3):201–213.10.1016/j.diin.2014.04.003
-
(2014)
Digital Invest
, vol.11
, Issue.3
, pp. 201-213
-
-
Anglano, C.1
-
43
-
-
15944399154
-
What is forensic computing? Trends & issues in crime and criminal justice
-
R.McKemmish. What is forensic computing? Trends & issues in crime and criminal justice Australian Inst Criminology; 1999;118:1–6.
-
(1999)
Australian Inst Criminology
, vol.118
, pp. 1-6
-
-
McKemmish, R.1
-
44
-
-
84870243026
-
An integrated conceptual digital forensic framework for cloud computing
-
B.Martini, K.-K.R.Choo. An integrated conceptual digital forensic framework for cloud computing. Digital Invest. 2012;9(2):71–80.10.1016/j.diin.2012.07.001
-
(2012)
Digital Invest
, vol.9
, Issue.2
, pp. 71-80
-
-
Martini, B.1
Choo, K.-K.R.2
-
45
-
-
84920152770
-
Distributed filesystem forensics: XtreemFS as a case study
-
B.Martini, K.-K.R.Choo. Distributed filesystem forensics: XtreemFS as a case study. Digital Invest. 2014;11(4):295–313.10.1016/j.diin.2014.08.002
-
(2014)
Digital Invest
, vol.11
, Issue.4
, pp. 295-313
-
-
Martini, B.1
Choo, K.-K.R.2
-
47
-
-
85018181307
-
Mobile cloud forensics: an analysis of seven popular Android apps
-
Choo K.-K.R., (ed), Boston, MA: Syngress
-
B.Martini, Q.Do, K.-K.R.Choo. Mobile cloud forensics: an analysis of seven popular Android apps. In: K.-K.R.Choo, editor. The cloud security ecosystem. Boston, MA: Syngress; 2015. p. 309–345.
-
(2015)
The cloud security ecosystem
, pp. 309-345
-
-
Martini, B.1
Do, Q.2
Choo, K.-K.R.3
-
49
-
-
84976544313
-
-
[cited 2014 November 24]. Available from:
-
EDRM LLC, EDRM Enron Email Data Set. EDRM LLC [Internet]. 2013 [cited 2014 November 24]. Available from: http://www.edrm.net/resources/data-sets/edrm-enron-email-data-set
-
(2013)
EDRM Enron Email Data Set. EDRM LLC [Internet]
-
-
|